-
Notifications
You must be signed in to change notification settings - Fork 58
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
GSD-automation
committed
Apr 19, 2024
1 parent
b683325
commit 10691d0
Showing
351 changed files
with
29,259 additions
and
1,774 deletions.
There are no files selected for viewing
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -146,6 +146,11 @@ | |
"name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", | ||
"refsource": "MLIST", | ||
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" | ||
}, | ||
{ | ||
"name": "FEDORA-2024-b46619f761", | ||
"refsource": "FEDORA", | ||
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/" | ||
} | ||
] | ||
}, | ||
|
@@ -164,199 +169,206 @@ | |
} | ||
}, | ||
"nvd.nist.gov": { | ||
"configurations": { | ||
"CVE_data_version": "4.0", | ||
"nodes": [ | ||
"cve": { | ||
"configurations": [ | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"versionEndExcluding": "8.1.11", | ||
"versionStartIncluding": "8.1.0", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"versionEndExcluding": "8.0.24", | ||
"versionStartIncluding": "8.0.0", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"cpe23Uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"versionEndExcluding": "7.4.31", | ||
"vulnerable": true | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "CE52893E-2C1E-4E15-87AA-F61CD2F49783", | ||
"versionEndExcluding": "7.4.31", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "E9E90EE8-1091-4D52-A070-E378CCE5A344", | ||
"versionEndExcluding": "8.0.24", | ||
"versionStartIncluding": "8.0.0", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "3A9D0A59-77E8-4003-90BF-6E062540B8AD", | ||
"versionEndExcluding": "8.1.11", | ||
"versionStartIncluding": "8.1.0", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
], | ||
"operator": "OR" | ||
] | ||
}, | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "5C675112-476C-4D7C-BCB9-A2FB2D0BC9FD", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
] | ||
}, | ||
{ | ||
"nodes": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
"cpeMatch": [ | ||
{ | ||
"criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", | ||
"vulnerable": true | ||
}, | ||
{ | ||
"criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", | ||
"matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", | ||
"vulnerable": true | ||
} | ||
], | ||
"negate": false, | ||
"operator": "OR" | ||
} | ||
] | ||
} | ||
], | ||
"descriptions": [ | ||
{ | ||
"lang": "en", | ||
"value": "In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications." | ||
}, | ||
{ | ||
"lang": "es", | ||
"value": "En PHP versiones anteriores a 7.4.31, 8.0.24 y 8.1.11, la vulnerabilidad permite a atacantes de la red y del mismo sitio establecer una cookie no segura est\u00e1ndar en el navegador de la v\u00edctima que es tratada como una cookie \"__Host-\" o \"__Secure-\" por las aplicaciones PHP" | ||
} | ||
], | ||
"id": "CVE-2022-31629", | ||
"lastModified": "2024-04-19T04:15:08.903", | ||
"metrics": { | ||
"cvssMetricV31": [ | ||
{ | ||
"cvssData": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 6.5, | ||
"baseSeverity": "MEDIUM", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", | ||
"version": "3.1" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.6, | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
} | ||
] | ||
}, | ||
"published": "2022-09-28T23:15:10.540", | ||
"references": [ | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Exploit", | ||
"Permissions Required", | ||
"Vendor Advisory" | ||
], | ||
"url": "https://bugs.php.net/bug.php?id=81727" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Mailing List", | ||
"Third Party Advisory" | ||
], | ||
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2L5SUVYGAKSWODUQPZFBUB3AL6E6CSEV/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LSJVPJTX7T3J5V7XHR4MFNHZGP44R5XE/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VI3E6A3ZTH2RP7OMLJHSVFIEQBIFM6RF/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XNIEABBH5XCXLFWWZYIDE457SPEDZTXV/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://security.gentoo.org/glsa/202211-03" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://security.netapp.com/advisory/ntap-20221209-0001/" | ||
}, | ||
{ | ||
"source": "[email protected]", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://www.debian.org/security/2022/dsa-5277" | ||
} | ||
], | ||
"sourceIdentifier": "[email protected]", | ||
"vulnStatus": "Modified", | ||
"weaknesses": [ | ||
{ | ||
"description": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
"lang": "en", | ||
"value": "NVD-CWE-noinfo" | ||
} | ||
], | ||
"operator": "OR" | ||
"source": "[email protected]", | ||
"type": "Primary" | ||
}, | ||
{ | ||
"children": [], | ||
"cpe_match": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
}, | ||
"description": [ | ||
{ | ||
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", | ||
"cpe_name": [], | ||
"vulnerable": true | ||
"lang": "en", | ||
"value": "CWE-20" | ||
} | ||
], | ||
"operator": "OR" | ||
"source": "[email protected]", | ||
"type": "Secondary" | ||
} | ||
] | ||
}, | ||
"cve": { | ||
"CVE_data_meta": { | ||
"ASSIGNER": "[email protected]", | ||
"ID": "CVE-2022-31629" | ||
}, | ||
"data_format": "MITRE", | ||
"data_type": "CVE", | ||
"data_version": "4.0", | ||
"description": { | ||
"description_data": [ | ||
{ | ||
"lang": "en", | ||
"value": "In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications." | ||
} | ||
] | ||
}, | ||
"problemtype": { | ||
"problemtype_data": [ | ||
{ | ||
"description": [ | ||
{ | ||
"lang": "en", | ||
"value": "NVD-CWE-noinfo" | ||
} | ||
] | ||
} | ||
] | ||
}, | ||
"references": { | ||
"reference_data": [ | ||
{ | ||
"name": "https://bugs.php.net/bug.php?id=81727", | ||
"refsource": "MISC", | ||
"tags": [ | ||
"Exploit", | ||
"Permissions Required", | ||
"Vendor Advisory" | ||
], | ||
"url": "https://bugs.php.net/bug.php?id=81727" | ||
}, | ||
{ | ||
"name": "FEDORA-2022-0b77fbd9e7", | ||
"refsource": "FEDORA", | ||
"tags": [ | ||
"Mailing List", | ||
"Third Party Advisory" | ||
], | ||
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/XNIEABBH5XCXLFWWZYIDE457SPEDZTXV/" | ||
}, | ||
{ | ||
"name": "FEDORA-2022-afdea1c747", | ||
"refsource": "FEDORA", | ||
"tags": [ | ||
"Mailing List", | ||
"Third Party Advisory" | ||
], | ||
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/VI3E6A3ZTH2RP7OMLJHSVFIEQBIFM6RF/" | ||
}, | ||
{ | ||
"name": "DSA-5277", | ||
"refsource": "DEBIAN", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://www.debian.org/security/2022/dsa-5277" | ||
}, | ||
{ | ||
"name": "FEDORA-2022-f204e1d0ed", | ||
"refsource": "FEDORA", | ||
"tags": [ | ||
"Mailing List", | ||
"Third Party Advisory" | ||
], | ||
"url": "https://lists.fedoraproject.org/archives/list/[email protected]/message/2L5SUVYGAKSWODUQPZFBUB3AL6E6CSEV/" | ||
}, | ||
{ | ||
"name": "GLSA-202211-03", | ||
"refsource": "GENTOO", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://security.gentoo.org/glsa/202211-03" | ||
}, | ||
{ | ||
"name": "https://security.netapp.com/advisory/ntap-20221209-0001/", | ||
"refsource": "CONFIRM", | ||
"tags": [ | ||
"Third Party Advisory" | ||
], | ||
"url": "https://security.netapp.com/advisory/ntap-20221209-0001/" | ||
}, | ||
{ | ||
"name": "[debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update", | ||
"refsource": "MLIST", | ||
"tags": [ | ||
"Mailing List", | ||
"Third Party Advisory" | ||
], | ||
"url": "https://lists.debian.org/debian-lts-announce/2022/12/msg00030.html" | ||
} | ||
] | ||
} | ||
}, | ||
"impact": { | ||
"baseMetricV3": { | ||
"cvssV3": { | ||
"attackComplexity": "LOW", | ||
"attackVector": "NETWORK", | ||
"availabilityImpact": "NONE", | ||
"baseScore": 6.5, | ||
"baseSeverity": "MEDIUM", | ||
"confidentialityImpact": "NONE", | ||
"integrityImpact": "HIGH", | ||
"privilegesRequired": "NONE", | ||
"scope": "UNCHANGED", | ||
"userInteraction": "REQUIRED", | ||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", | ||
"version": "3.1" | ||
}, | ||
"exploitabilityScore": 2.8, | ||
"impactScore": 3.6 | ||
} | ||
}, | ||
"lastModifiedDate": "2023-01-20T13:12Z", | ||
"publishedDate": "2022-09-28T23:15Z" | ||
} | ||
} | ||
} | ||
} |
Oops, something went wrong.